WO2003069489A1 - Procede d'authentification - Google Patents
Procede d'authentification Download PDFInfo
- Publication number
- WO2003069489A1 WO2003069489A1 PCT/JP2002/001256 JP0201256W WO03069489A1 WO 2003069489 A1 WO2003069489 A1 WO 2003069489A1 JP 0201256 W JP0201256 W JP 0201256W WO 03069489 A1 WO03069489 A1 WO 03069489A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- user
- recognition
- information
- password
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Definitions
- the present invention uses a fixed or portable information communication terminal device over an open communication network to access another information terminal system or server system whose reliability is guaranteed by public key encryption or the like.
- the present invention relates to a method of authenticating a user, a format of authentication information used for authentication, and a processing method.
- BACKGROUND ART Since ancient times, in particular in the field of military 'commerce', mutual recognition by secret word and the identification of permission and permission by means of a pass such as 'open sesame' have been carried out.
- encryption of the plain text can be performed in a closed system of related parties.
- quantum cryptography based on “quantum mechanical entanglement (quantum entandalized state)”
- authentication is also valid for cryptography and mutual authentication in the case where communication methods are developed. Both are performed depending on the terminal equipment or the system on the terminal. Therefore, when using a terminal device in a public place where a large number of unspecified people can use it or using it in a portable terminal that is easily exposed to the risk of losing the theft, anyone operates the terminal device.
- biometrics information is considered to be the most suitable for personal authentication because it is information unique to the user, and many techniques for quantifying biometrics information have already been developed.
- the uniqueness of the pieometrics information conversely limits the adoption of the physical feature that can be used alternatively, and the authentication data is stolen.
- the user may cause social problems such as social cancellation, that is, a problem of uniqueness and alternatives.
- a crime is violently adopted, it may be more devastating than conventional crimes such as excision of body parts used for certification.
- the use of the pyometritus information which should originally be the only one is also the same technology as the information processing technology such as CG and speech synthesis.
- fingerprints can be easily copied by silicone rubber if they are fingerprinted, that is, they are not managed by the user, There is a problem of authentication information leakage outside the system.
- completion can be easily achieved even if the fingerprint data is released publicly or the national power itself can be used, that is, the system is not managed by the user and the system There is a problem of leaked authentication information outside.
- a finger used for verification is lost in an accident or the like, or even if only the finger belly is injured, authentication can not be performed, that is, a problem of uniqueness and alternatives.
- the problem of voiceprints being easily copied by a recorder that is, the problem of authentication information leakage outside the management of the user and outside the system, or the problem that authentication information itself can be generated by information processing technology. That is, there is a problem that it can be electronically forged.
- the handwriting itself is difficult to be stable because the handwriting itself is largely different depending on the physical condition and mental condition, and it is stable if robot technology such as measurement technology and numerical control technology is applied.
- robot technology such as measurement technology and numerical control technology
- authentication is performed by collating this with key information on the authentication device, and in this case, as in the case of key methods such as the public key method, a completed problem using a secret key or There is a problem that it is not safe in situations where there is a terminal authentication problem, an interception problem, and there is a motivation for the authentication party. '
- the conventional authentication methods are roughly classified into the ten problems as described above, among which the fifth, sixth, seventh and eighth are problems specific to the method of authentication based on pyometrics information .
- the sixth problem may only be mitigated by the combination with other authentication methods. Therefore, in the present invention, firstly, in order to provide indecipherability to a key, it is an object of the present invention to provide a method having a combination number that can not be deciphered sufficiently against brute force attack in a password authentication method.
- the user-specific authentication information issued by the user or authentication information that only the user can know, and the authentication information of the user registered on the authentication device a collatable and irreversible relationship or authentication
- the authentication party completes the transaction and the authentication information is stolen due to authentication information theft on the authentication device.
- the authentication information of the user irreversibly converted by a unique random number or function is used for each user.
- the authentication device registered with the unique random number or function on the authentication device, authentication information from the user based on the authentication request, converted by the random number or function, and collated with the information registered on the authentication device. From the top to the side that leaks authentication information and authentication Completed, and responded to interception leaks.
- a long password such as a path sentence
- the path sentence force applied by the user A character string (hereinafter referred to as a pass code p1) is extracted using a unique random number for each user.
- the extracted character string is stored together with the user ID in the authentication device, the authentication of the user is also issued an authentication request, and when the pass sentence is sent together with the user ID, the authentication device calls the passcode p1 in which the user ID is also registered. At the same time, the corresponding unique random number is called, the user converts the transmitted path sentence into passcode p1 using the unique random number registered in the authentication device, and the converted passcode and the authentication device Authentication of the user is performed by comparing the passcode p1 corresponding to the user ID registered in.
- the authentication information may use or be combined with information carried on a portable object or other personal information such as biometrics information.
- the password structure is increased by increasing the base value in the number system. Even with a small number of digits, a large number of combinations could be secured, which made it a difficult way for a brute force attack to break a password.
- a method of representing characters used in the pass code it is possible to use a password that can not be deciphered by eavesdropping by using characters such as figures that are similar or identical to each other (hereinafter referred to as F character). It was a method.
- the authentication device changes the arrangement of passwords using random numbers and presents it to the user, and the user inputs the order (hereinafter referred to as pass code P2 ) for forming a regular arrangement.
- authentication is performed by comparing the pass code p2 input by the user with the pass code p2 generated by the authentication device, so that it is not broken by interception or communication interception.
- the solutions described in the first use a method that uses biometrics information as authentication information without displaying it on the monitor, or a path sentence among the first solutions. May be monitored by using authentication information stored on the terminal as it is for authentication without displaying it on the monitor according to the method used by registering on the terminal or using other public key or other terminal authentication method.
- the authentication information based on the user's memory is input by the user every time the authentication request is made by the second solution, or the first described solution is used for the password.
- the one-time password method it is possible to authenticate that the authentication information input person is the registered user himself, and to use the data stored on the terminal.
- Both simultaneous authentication method for inputting authentication information based on the user's memory each time the authentication request And a person authentication method for solving the problems described in the first, second, third, fourth, fifth, sixth and seventh did.
- the large base value in the numeration system is represented by F characters, and from a limited number of F characters previously registered by the user.
- the solution described in the second method is to increase the number of F characters provided by the authenticating side at the time of password registration by the user to increase the number system.
- the analysis performance is improved by improving the function of the information processing apparatus, and the complexity is easily obtained by making the length of the sentence longer. It is possible to take measures to increase the
- the method of using a sentence can also be used as a secret key for terminal authentication or a secret key mounted on a portable object such as a card.
- the path sentence when using a path sentence, since the path sentence can also be used by storing the path sentence, direct input is also possible, and a terminal connected to a network anywhere in the world can be used.
- identity authentication is possible. This enables emergency response such as changing a password by inputting a terminal power path sentence connected to a network around the user in an emergency such as when the terminal is stolen.
- a nose sentence can be created by extracting a force, for example, a diary, it is easy for the user to create, and it is difficult for a third party to estimate the sentence.
- Figure 1 shows that the preferred system according to the present invention SE ⁇ 3 ⁇ 4 ⁇ 3 ⁇ 4 r 3 ⁇ 4 t; # ⁇ The composition of the system configuration is shown in order to make it visible.
- Fig. 2 is an example of Fig. 1 according to the present invention.
- ⁇ ⁇ Flow charter is one eyebrow.
- FIG. 3 is a diagram of FIG. It is a chart of one point.
- Fig. 4 shows an example of the invention «in Fig. 2 ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ EW EW EW EW it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it it
- FIG. 5 is a whole diagram of the system of identity recognition shown in FIG. 2 as an example according to the present invention.
- FIG. 5 is a system diagram of users and users in the system configuration of ⁇ identity SEW.
- FIG. 7 is a system configuration diagram of a service among the system diagrams of the user laosi shown in FIG.
- FIG. 8 is a system configuration diagram of recognition among the system configurations of 5 ⁇ authentication in FIG. 5 as an example of the system according to the present invention.
- FIG. 9 is a sequence diagram showing the authentication ff 3 ⁇ 4 stored in the terminal 3 ⁇ 4 h for the pass code p 1 recognition 1 EMi in FIG. 3 as an example according to the present invention.
- FIG. 10 shows an embodiment according to the present invention as shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, FIG. 6, FIG. 6, FIG. 7, FIG.
- FIG. 11 is a sequence diagram of FIG. 4 as an example according to the present invention, in which an authentication code for a pass code p2 recognition fig is recognized as a recognition failure.
- FIG. 12 shows an example of FIG. 2: ⁇ “f Identification within IE ⁇ 3 ⁇ 43 ⁇ 4, Nos code p 1 recognition
- FIG. 13 shows the prohibited example of the present invention.
- FIG. 14 is a flowchart of the process according to the present invention shown in FIGS. 1 (c) and 1 (d), which is preferred according to the present invention and has a pass code p2 recognition SEM.
- FIG. 15 is a flow chart of the process of authentication processing of a preferred pass code p1 according to the present invention shown in FIG. Explanation of sign
- the power of this invention is a flow chart conceptually showing the whole of a preferable personal authentication method.
- the main parts of the system configuration are synthesized and shown in order to list the entire stem.
- FIG. 1 is a flow chart conceptually showing the whole of a preferable processing method according to the present invention, for performing person authentication when using an electronic information device, or for performing person authentication on an information communication network. , In order to display the entire system in a list, the principle of the method based on the password used in the main parts of the system configuration and each processing stage is shown.
- FIG. 1 (b) shows a password method used for terminal authentication, and the method using the password is executed in pass code p1 authentication process (10) of FIG. 1 (a).
- the passcode p1 authentication process (10) shown in Fig. 1 (a) first, the user registered his own pass sentence (212) on the terminal, and the authentication device 5 issued the authentication device for each user.
- the passcode p1 generated by the user is sent by the passcode p1 generation module (59) using the unique random number (6223), the passcode p1 extracted from the pass sentence (212) is used as the passcode pi (6222) in the authentication device database unit 62. sign up.
- the authentication device transmits the pass sentence (212) sent from the user terminal by using the unique random number (6223) in the pass code p1 generation module (59). Then, the user terminal is authenticated by collating the passcode p1 with the passcode pi (6222) already registered on the authentication device in the verification module (52). Since the relationship between the patient's sentence and the passcode p1 is irreversibly determined, and only the passcode p1 is registered on the authentication unit, the stealing is performed even if the power passcode p1 on the authentication unit is stolen. However, the third party can not restore the pass sentence itself, so it is an authentication method that can not be fulfilled.
- path sentences can not be stolen by monitoring activities.
- pass sentences are not short phrases like passwords, or a combination of numbers and letters, so they can be narrative or rhyme-like, so users can remember them more than conventional passwords. If the terminal itself is stolen, it is possible to change the registration data by accessing the authentication device from another terminal and prevent damage in advance, so that the secret key in the public key and the terminal device code can be terminal-authenticated. More flexible than using for
- FIG. 1 (d) shows a method using a password used in the personal authentication process, and the method using the password is executed in the pass code p2 authentication process (11) of FIG. 1 (a).
- the user selects F characters as a password from among the F characters having a large basis in the number system provided by the authentication device (5) by the number set by the authentication device, and arranges them in the order of arrangement.
- the authentication device (5) registers the F character and the arrangement order in the database unit (62) as a password F character (6224) and an F character arrangement (6225).
- the authentication device (5) when the authentication request is received from the user, the authentication device (5) generates a random number for rearranging the sequence for the user, and uses the random number to rearrange the order of arrangement of the password-F character (6224) and sends it to the user terminal. Do. At this time, a random number (636) for array composition is simultaneously registered in the temporary storage unit. User's sequence order registered in advance The input module (23) is input as a pass code p2 and transmitted to the authentication device (5). The authentication device (5) calls the F character (6224) as the user ID (6221) power password and the F character arrangement (6225) as the arrangement order thereof, and passes the path according to the arrangement combination random number (636) in the temporary storage unit.
- a code p2 is generated, and user authentication is performed by comparing and collating the pass code p2 sent by the user and the matching module (52).
- the user himself can create a password arrangement out of a small number of options, which is easy for the user to handle. Furthermore, for each authentication request from the user, the authentication device transmits to the user the registered F character in which the arrangement order has been rearranged with a new random number to the user, and the user rearranges the arrangement order of F characters so that it becomes a pass order arrangement. By creating this reordering order as a passcode p2 for authentication, the password can not be reproduced even if the passcode p2 is intercepted.
- the passcode p1 authentication process (10) performs an authentication process based on a path sentence having a large number of digits as a password registered on the terminal, and stores the user's own memory.
- the passcode p2 authentication process (11). Is a line based on the password process based on the password, which can have a large number of combinations even with a small number of words by increasing the base value in the number system passcode p2 authentication process (11).
- the authentication key is stolen from the authentication device, monitoring, stealing, communication interception, leakage outside the control of the user and outside the system, electronic forgery, It shows that it is a method / device for identity authentication that can cope with all the problems of conventional technology, such as brute force attacks.
- the terminal device is stolen, the number of F characters presented to the user from the authentication device at the time of the authentication request is only the number registered by the user in advance, so a third party who obtained the terminal device will It is possible to decipher the password by brute force attack using the terminal equipment.
- the terminal device is stolen or lost, the user directly inputs a path sentence from another terminal device and performs the passcode p1 processing process and the passcode P2 processing process. You can prevent damage by changing the registration data of
- terminal authentication methods such as a device code uniquely assigned to each terminal device, or a secret key in a public key system, can specify a user terminal, Other Uni registered in It is possible to substitute with secure information or key information registered in a portable object.
- (b) and (d) can also function as a single person authentication system.
- (c) conceptually shows, using a table, a preferable method as to the configuration and the method of producing the F character which is advantageous to the present invention.
- the F character is composed of a basic form and its color variation and form variation.
- the creation method first creates some basic variations, and creates partial variations or total color variations on the basic variations to create color variations, and then the shape or arrangement of each variation. By making small changes it is possible to produce a large number of variations. Alternatively, new variations can be made simply by setting another new character code for the same figure.
- the user displayed on the screen selects from among the F characters of the password registered in advance, so that the user's memory is recalled This is the same situation as when a hint is always displayed, so the possibility that the user forgets the password and can not be authenticated is lower than that of the conventional password authentication method.
- the portions of the public key and the secret key for encryption shown in the sequence diagrams are passcode P1 or passcode p2 or passcode.
- Password for generating p1 or password strength for generating passcode p2 A generated private key may be used.
- identity authentication In electronic commerce, identity authentication to prove that it is a true holder of electronic money, an electronic wallet, or a credit card, identity authentication for issuing various certificates in an electronic government etc. or other handling of personal data Sufficient identity authentication performance can be provided for identity authentication at a time or time.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/504,516 US20050144484A1 (en) | 2002-02-14 | 2002-02-14 | Authenticating method |
PCT/JP2002/001256 WO2003069489A1 (fr) | 2002-02-14 | 2002-02-14 | Procede d'authentification |
JP2003568545A JPWO2003069489A1 (ja) | 2002-02-14 | 2002-02-14 | 本人認証の方法 |
AU2002232187A AU2002232187A1 (en) | 2002-02-14 | 2002-02-14 | Authenticating method |
EP02712356A EP1484690A1 (fr) | 2002-02-14 | 2002-02-14 | Procede d'authentification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2002/001256 WO2003069489A1 (fr) | 2002-02-14 | 2002-02-14 | Procede d'authentification |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003069489A1 true WO2003069489A1 (fr) | 2003-08-21 |
Family
ID=27677673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/001256 WO2003069489A1 (fr) | 2002-02-14 | 2002-02-14 | Procede d'authentification |
Country Status (5)
Country | Link |
---|---|
US (1) | US20050144484A1 (fr) |
EP (1) | EP1484690A1 (fr) |
JP (1) | JPWO2003069489A1 (fr) |
AU (1) | AU2002232187A1 (fr) |
WO (1) | WO2003069489A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101547792B1 (ko) | 2015-01-21 | 2015-08-26 | 주식회사 엔씨소프트 | 격자 패턴을 이용한 사용자 인증 방법 및 시스템 |
Families Citing this family (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6816058B2 (en) * | 2001-04-26 | 2004-11-09 | Mcgregor Christopher M | Bio-metric smart card, bio-metric smart card reader and method of use |
US7444676B1 (en) * | 2001-08-29 | 2008-10-28 | Nader Asghari-Kamrani | Direct authentication and authorization system and method for trusted network of financial institutions |
US7219232B2 (en) * | 2002-04-03 | 2007-05-15 | Matsushita Electric Industrial Co., Ltd. | Method of providing information via a communication network and information providing system |
US7308708B2 (en) * | 2002-08-02 | 2007-12-11 | Hewlett-Packard Development Company, L.P. | Alternate encodings of a biometric identifier |
JP2004342088A (ja) * | 2003-04-21 | 2004-12-02 | Sony Corp | 端末機器認証システム、端末機器、第1の振り分けサーバ、振り分けシステム、サービスサーバ、第2の振り分けサーバ、端末機器方法、第1の振り分け方法、振り分け方法、サービス提供方法、サービスサーバ方法、第1の振り分け方法、第2の振り分け方法、端末機器プログラム、第1の振り分けプログラム、振り分けプログラム、サービスサーバプログラム、第2の振り分けプログラム、及び記憶媒体 |
JP4240297B2 (ja) * | 2003-04-21 | 2009-03-18 | ソニー株式会社 | 端末機器、認証端末プログラム、機器認証サーバ、機器認証プログラム |
US20040225880A1 (en) * | 2003-05-07 | 2004-11-11 | Authenture, Inc. | Strong authentication systems built on combinations of "what user knows" authentication factors |
US8185747B2 (en) * | 2003-05-22 | 2012-05-22 | Access Security Protection, Llc | Methods of registration for programs using verification processes with biometrics for fraud management and enhanced security protection |
US20070060358A1 (en) | 2005-08-10 | 2007-03-15 | Amaitis Lee M | System and method for wireless gaming with location determination |
US8092303B2 (en) | 2004-02-25 | 2012-01-10 | Cfph, Llc | System and method for convenience gaming |
US7534169B2 (en) | 2005-07-08 | 2009-05-19 | Cfph, Llc | System and method for wireless gaming system with user profiles |
US8616967B2 (en) | 2004-02-25 | 2013-12-31 | Cfph, Llc | System and method for convenience gaming |
US7734929B2 (en) * | 2004-04-30 | 2010-06-08 | Hewlett-Packard Development Company, L.P. | Authorization method |
US10510214B2 (en) | 2005-07-08 | 2019-12-17 | Cfph, Llc | System and method for peer-to-peer wireless gaming |
US8070604B2 (en) | 2005-08-09 | 2011-12-06 | Cfph, Llc | System and method for providing wireless gaming as a service application |
US7836492B2 (en) * | 2005-10-20 | 2010-11-16 | Sudharshan Srinivasan | User authentication system leveraging human ability to recognize transformed images |
US20090227233A1 (en) * | 2005-10-21 | 2009-09-10 | Sanyo Electric Co., Ltd. | Input device for inputting password or the like and mobile telephone having the input device |
US7644861B2 (en) | 2006-04-18 | 2010-01-12 | Bgc Partners, Inc. | Systems and methods for providing access to wireless gaming devices |
US7549576B2 (en) | 2006-05-05 | 2009-06-23 | Cfph, L.L.C. | Systems and methods for providing access to wireless gaming devices |
US8939359B2 (en) | 2006-05-05 | 2015-01-27 | Cfph, Llc | Game access device with time varying signal |
EP1879127A1 (fr) * | 2006-07-13 | 2008-01-16 | Cipherstone Technologies AB | Procédé et système d'autentification de l'utilisateur et système de gestion de mot de passe |
US7849321B2 (en) * | 2006-08-23 | 2010-12-07 | Authernative, Inc. | Authentication method of random partial digitized path recognition with a challenge built into the path |
US9306952B2 (en) | 2006-10-26 | 2016-04-05 | Cfph, Llc | System and method for wireless gaming with location determination |
US8510567B2 (en) | 2006-11-14 | 2013-08-13 | Cfph, Llc | Conditional biometric access in a gaming environment |
US9411944B2 (en) | 2006-11-15 | 2016-08-09 | Cfph, Llc | Biometric access sensitivity |
US8645709B2 (en) | 2006-11-14 | 2014-02-04 | Cfph, Llc | Biometric access data encryption |
US8311530B2 (en) | 2007-01-26 | 2012-11-13 | Research In Motion Limited | Touch entry of password on a mobile device |
US8319601B2 (en) | 2007-03-14 | 2012-11-27 | Cfph, Llc | Game account access device |
US9183693B2 (en) | 2007-03-08 | 2015-11-10 | Cfph, Llc | Game access device |
US8581721B2 (en) | 2007-03-08 | 2013-11-12 | Cfph, Llc | Game access device with privileges |
US20090038006A1 (en) * | 2007-08-02 | 2009-02-05 | Traenkenschuh John L | User authentication with image password |
KR20090047917A (ko) * | 2007-11-09 | 2009-05-13 | 삼성전자주식회사 | 외장 메모리 액세스 장치 및 방법 |
CN101163010B (zh) * | 2007-11-14 | 2010-12-08 | 华为软件技术有限公司 | 对请求消息的鉴权方法和相关设备 |
JP4459282B2 (ja) | 2008-06-30 | 2010-04-28 | 株式会社東芝 | 情報処理装置およびセキュリティ保護方法 |
US8347103B2 (en) * | 2009-01-13 | 2013-01-01 | Nic, Inc. | System and method for authenticating a user using a graphical password |
US8214892B2 (en) * | 2009-07-15 | 2012-07-03 | Hewlett-Packard Development Company, L.P. | Password authentication system and methods |
CN102279910A (zh) * | 2010-06-11 | 2011-12-14 | 鸿富锦精密工业(深圳)有限公司 | 具有加解密功能的装置及其加解密方法 |
US8974302B2 (en) | 2010-08-13 | 2015-03-10 | Cfph, Llc | Multi-process communication regarding gaming information |
US8956231B2 (en) | 2010-08-13 | 2015-02-17 | Cfph, Llc | Multi-process communication regarding gaming information |
JP5143258B2 (ja) * | 2011-06-17 | 2013-02-13 | 株式会社東芝 | 情報処理装置、情報処理方法及び制御プログラム |
KR101175042B1 (ko) * | 2011-11-10 | 2012-08-17 | 숭실대학교산학협력단 | 사용자 단말기의 패스워드 인증 방법 및 그 장치 |
DE112012005033B4 (de) | 2011-12-01 | 2020-12-17 | International Business Machines Corporation | Systemübergreifende sichere Anmeldung |
TW201838697A (zh) | 2012-02-28 | 2018-11-01 | 美商Cfph有限責任公司 | 提供遊戲服務的方法及裝置 |
CN105205386A (zh) * | 2014-06-25 | 2015-12-30 | 腾讯科技(深圳)有限公司 | 移动终端应用程序密码保护方法和装置 |
CN105450592A (zh) * | 2014-08-05 | 2016-03-30 | 阿里巴巴集团控股有限公司 | 安全校验方法、装置、服务器及终端 |
JP6566644B2 (ja) * | 2015-01-20 | 2019-08-28 | Line株式会社 | 認証サーバ装置、プログラム、認証方法及び認証システム |
JP6426504B2 (ja) * | 2015-03-10 | 2018-11-21 | 株式会社東芝 | 携帯可能電子装置、及びシステム |
WO2017007767A1 (fr) * | 2015-07-08 | 2017-01-12 | Alibaba Group Holding Limited | Procédé et dispositif d'authentification à l'aide de mots de passe dynamiques |
CN106341372A (zh) | 2015-07-08 | 2017-01-18 | 阿里巴巴集团控股有限公司 | 终端的认证处理、认证方法及装置、系统 |
CN106656907B (zh) * | 2015-10-28 | 2021-03-02 | 阿里巴巴集团控股有限公司 | 用于认证的方法、装置、终端设备及系统 |
US20170154173A1 (en) * | 2015-11-27 | 2017-06-01 | Chao-Hung Wang | Array password authentication system and method thereof |
CN107086908B (zh) | 2016-02-15 | 2021-07-06 | 阿里巴巴集团控股有限公司 | 一种量子密钥分发方法及装置 |
CN107086907B (zh) | 2016-02-15 | 2020-07-07 | 阿里巴巴集团控股有限公司 | 用于量子密钥分发过程的密钥同步、封装传递方法及装置 |
CN107347058B (zh) | 2016-05-06 | 2021-07-23 | 阿里巴巴集团控股有限公司 | 数据加密方法、数据解密方法、装置及系统 |
CN107370546B (zh) | 2016-05-11 | 2020-06-26 | 阿里巴巴集团控股有限公司 | 窃听检测方法、数据发送方法、装置及系统 |
CN107404461B (zh) | 2016-05-19 | 2021-01-26 | 阿里巴巴集团控股有限公司 | 数据安全传输方法、客户端及服务端方法、装置及系统 |
EP3364326B1 (fr) * | 2016-06-25 | 2020-05-13 | Huawei Technologies Co., Ltd. | Procédé et appareil pour générer un mot de passe au moyen d'une commande tactile à pression |
CN107959567B (zh) | 2016-10-14 | 2021-07-27 | 阿里巴巴集团控股有限公司 | 数据存储方法、数据获取方法、装置及系统 |
CN107959656B (zh) | 2016-10-14 | 2021-08-31 | 阿里巴巴集团控股有限公司 | 数据安全保障系统及方法、装置 |
US10164778B2 (en) | 2016-12-15 | 2018-12-25 | Alibaba Group Holding Limited | Method and system for distributing attestation key and certificate in trusted computing |
CN108667608B (zh) | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | 数据密钥的保护方法、装置和系统 |
CN108667773B (zh) | 2017-03-30 | 2021-03-12 | 阿里巴巴集团控股有限公司 | 网络防护系统、方法、装置及服务器 |
CN108736981A (zh) | 2017-04-19 | 2018-11-02 | 阿里巴巴集团控股有限公司 | 一种无线投屏方法、装置及系统 |
US10860707B2 (en) * | 2017-12-15 | 2020-12-08 | Dell Products L.P. | Systems and methods for obfuscation of password key and dynamic key pool management |
CN109450620B (zh) | 2018-10-12 | 2020-11-10 | 创新先进技术有限公司 | 一种移动终端中共享安全应用的方法及移动终端 |
CN111031191B (zh) * | 2019-11-06 | 2021-09-17 | 南京航空航天大学 | 基于受控交替量子漫步与dna序列操作的图像加密方法 |
US11429519B2 (en) | 2019-12-23 | 2022-08-30 | Alibaba Group Holding Limited | System and method for facilitating reduction of latency and mitigation of write amplification in a multi-tenancy storage drive |
EP3907594B1 (fr) * | 2020-05-06 | 2024-11-06 | Mastercard International Incorporated | Mécanisme d'entrée d'utilisateur permettant de réordonner des éléments graphiques |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997020265A1 (fr) * | 1995-11-30 | 1997-06-05 | Casio Computer Co., Ltd. | Dispositif de stockage de donnees secretes, procede de lecture de donnees secretes et support de stockage de programme de gestion |
JP2001282738A (ja) * | 2000-03-29 | 2001-10-12 | Microsoft Corp | 個人認証方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001056213A1 (fr) * | 2000-01-26 | 2001-08-02 | Citicorp Development Center, Inc. | Systeme et procede d'authentification d'utilisateurs |
-
2002
- 2002-02-14 EP EP02712356A patent/EP1484690A1/fr not_active Withdrawn
- 2002-02-14 US US10/504,516 patent/US20050144484A1/en not_active Abandoned
- 2002-02-14 AU AU2002232187A patent/AU2002232187A1/en not_active Abandoned
- 2002-02-14 WO PCT/JP2002/001256 patent/WO2003069489A1/fr not_active Application Discontinuation
- 2002-02-14 JP JP2003568545A patent/JPWO2003069489A1/ja active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1997020265A1 (fr) * | 1995-11-30 | 1997-06-05 | Casio Computer Co., Ltd. | Dispositif de stockage de donnees secretes, procede de lecture de donnees secretes et support de stockage de programme de gestion |
JP2001282738A (ja) * | 2000-03-29 | 2001-10-12 | Microsoft Corp | 個人認証方法 |
Non-Patent Citations (1)
Title |
---|
NAOKI TABUCHI: "Juyosei masu joho security no kakuritsu", NIKKEI COMPUTER, no. 316, 9 August 1993 (1993-08-09), pages 111 - 121, XP002951539 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101547792B1 (ko) | 2015-01-21 | 2015-08-26 | 주식회사 엔씨소프트 | 격자 패턴을 이용한 사용자 인증 방법 및 시스템 |
Also Published As
Publication number | Publication date |
---|---|
EP1484690A1 (fr) | 2004-12-08 |
JPWO2003069489A1 (ja) | 2005-11-04 |
AU2002232187A1 (en) | 2003-09-04 |
US20050144484A1 (en) | 2005-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003069489A1 (fr) | Procede d'authentification | |
US11803633B1 (en) | Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates | |
US7024562B1 (en) | Method for carrying out secure digital signature and a system therefor | |
Feng et al. | Private key generation from on‐line handwritten signatures | |
US7996683B2 (en) | System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys | |
CN102132288B (zh) | 生物体认证系统及其方法 | |
WO2002073877A2 (fr) | Systeme et procede de verification d'utilisateur et de donnees | |
US20030101349A1 (en) | Method of using cryptography with biometric verification on security authentication | |
US11182466B2 (en) | User authentication apparatus and recording media | |
JP2006209697A (ja) | 個人認証システム、この個人認証システムに使用される認証装置、および個人認証方法 | |
WO2017006115A1 (fr) | Sécurité biométrique pour un système cryptographique | |
CN106022037B (zh) | 一种金融终端认证方法与装置 | |
Murugesh | Advanced biometric ATM machine with AES 256 and steganography implementation | |
JP2001312477A (ja) | 認証システム、並びに、認証装置およびその方法 | |
Prinslin et al. | Secure Online Transaction With User Authentication | |
ES2631002B1 (es) | Dispositivo para facilitar transacciones financieras, procedimiento e instalación correspondientes | |
JP2002183095A (ja) | 個人認証方法 | |
WO2023022584A1 (fr) | Système et procédé de décentralisation d'identification numérique | |
Naidu et al. | Secure Authentication in Online Voting System Using Multiple Image Secret Sharing. | |
Joshi | Session passwords using grids and colors for web applications and PDA | |
Lin et al. | A tabular steganography scheme for graphical password authentication | |
KR20060019926A (ko) | 이미지를 이용한 인증시스템 및 인증방법 | |
Nwankwo et al. | Blockchain Private Key Storage System for IoT Device | |
Maale et al. | Enhancing Security in the Banking Sector using Biometric and Cryptography. A proposed framework for BACCSOD in Ghana. | |
JP2006011681A (ja) | 身分証明システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002712356 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002712356 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10504516 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003568545 Country of ref document: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2002712356 Country of ref document: EP |